Author of the publication

A Hardware-Efficient Implementation of CLOC for On-chip Authenticated Encryption.

, , , and . ISVLSI, page 311-315. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Hardware Implementation of Tang-Maitra Boolean Functions., , , and . WAIFI, volume 11321 of Lecture Notes in Computer Science, page 111-127. Springer, (2018)Hardware Implementation of Masked SKINNY SBox with Application to AEAD., and . SPACE, volume 13783 of Lecture Notes in Computer Science, page 50-69. Springer, (2022)Tile-based modular architecture for accelerating homomorphic function evaluation on FPGA., and . MWSCAS, page 1-4. IEEE, (2016)SoK: On DFA Vulnerabilities of Substitution-Permutation Networks., , , , , and . AsiaCCS, page 403-414. ACM, (2019)Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms., , , and . IACR Trans. Symmetric Cryptol., 2020 (1): 43-120 (2020)A note on -Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme-.. IACR Cryptol. ePrint Arch., (2024)On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study., , , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 657-681. Springer, (2021)Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption., , and . INDOCRYPT, volume 10698 of Lecture Notes in Computer Science, page 282-301. Springer, (2017)Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV.. IACR Cryptol. ePrint Arch., (2024)Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed.. IACR Cryptology ePrint Archive, (2019)